diff --git a/diameter/dictionary.xml b/diameter/dictionary.xml index 385c6ddfe0..b2b107a2d6 100644 --- a/diameter/dictionary.xml +++ b/diameter/dictionary.xml @@ -898,7 +898,7 @@ - + diff --git a/epan/dissectors/asn1/camel/CAP-gsmSSF-gsmSCF-ops-args.asn b/epan/dissectors/asn1/camel/CAP-gsmSSF-gsmSCF-ops-args.asn index 3e8f738009..36f847edf4 100644 --- a/epan/dissectors/asn1/camel/CAP-gsmSSF-gsmSCF-ops-args.asn +++ b/epan/dissectors/asn1/camel/CAP-gsmSSF-gsmSCF-ops-args.asn @@ -212,7 +212,7 @@ ApplyChargingArg {PARAMETERS-BOUND : bound} ::= SEQUENCE { DEFAULT legID:sendingSideID:leg1, ..., -- WS modification Frensh National standard addition - -- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7656 + -- https://gitlab.com/wireshark/wireshark/-/issues/7656 iTXcharging [64] BOOLEAN OPTIONAL -- End WS } diff --git a/epan/dissectors/asn1/gsm_map/Ericsson.asn b/epan/dissectors/asn1/gsm_map/Ericsson.asn index b0206d7809..ab8879b586 100644 --- a/epan/dissectors/asn1/gsm_map/Ericsson.asn +++ b/epan/dissectors/asn1/gsm_map/Ericsson.asn @@ -34,7 +34,7 @@ FROM MAP-ExtensionDataTypes { gsm-Network (1) modules (3) map-ExtensionDataTypes (21) version13 (13)} ; --- non 3GPP standard compliant extension used by Ericsson (see https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7648) +-- non 3GPP standard compliant extension used by Ericsson (see https://gitlab.com/wireshark/wireshark/-/issues/7648) EnhancedCheckIMEI-Arg ::= SEQUENCE { imei IMEI, requestedEquipmentInfo RequestedEquipmentInfo OPTIONAL, diff --git a/epan/dissectors/asn1/mpeg-pes/packet-mpeg-pes-template.c b/epan/dissectors/asn1/mpeg-pes/packet-mpeg-pes-template.c index fb10b5b592..d809702af5 100644 --- a/epan/dissectors/asn1/mpeg-pes/packet-mpeg-pes-template.c +++ b/epan/dissectors/asn1/mpeg-pes/packet-mpeg-pes-template.c @@ -462,7 +462,7 @@ dissect_mpeg_pes(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data offset = dissect_mpeg_pes_Stream(tvb, offset, &asn1_ctx, tree, hf_mpeg_pes_extension); - /* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2229 + /* https://gitlab.com/wireshark/wireshark/-/issues/2229 * A value of 0 indicates that the PES packet length * is neither specified nor bounded and is allowed * only in PES packets whose payload is a video diff --git a/epan/dissectors/packet-acdr.c b/epan/dissectors/packet-acdr.c index 1f0960c68a..78f8db1255 100644 --- a/epan/dissectors/packet-acdr.c +++ b/epan/dissectors/packet-acdr.c @@ -1207,7 +1207,7 @@ dissect_acdr_voiceai(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void * * an http_message_info_t *, and that's *NOT* what we hand * subdissectors. Hilarity ensures; see * - * https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16622 + * https://gitlab.com/wireshark/wireshark/-/issues/16622 */ call_dissector(json_dissector_handle, tvb, pinfo, tree); return tvb_captured_length(tvb); diff --git a/epan/dissectors/packet-bitcoin.c b/epan/dissectors/packet-bitcoin.c index e185f164fb..90bc740c68 100644 --- a/epan/dissectors/packet-bitcoin.c +++ b/epan/dissectors/packet-bitcoin.c @@ -805,7 +805,7 @@ create_data_tree(proto_tree *tree, header_field_info* hfi, tvbuff_t *tvb, guint3 * So: the loop should be executed only when 'tree' is defined so that the * proto_ calls will throw an exception when the tvb is used up; * This should only take a few-hundred loops at most. - * https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8312 + * https://gitlab.com/wireshark/wireshark/-/issues/8312 */ /** diff --git a/epan/dissectors/packet-cisco-sm.c b/epan/dissectors/packet-cisco-sm.c index bca93a8c27..89ddbd6ed9 100644 --- a/epan/dissectors/packet-cisco-sm.c +++ b/epan/dissectors/packet-cisco-sm.c @@ -211,7 +211,7 @@ static const value_string sm_pdu_type_value[] = { }; /* TODO: Change to useful name once known */ -#define SM_PROTOCOL_X004 0x0004 /* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7188 */ +#define SM_PROTOCOL_X004 0x0004 /* https://gitlab.com/wireshark/wireshark/-/issues/7188 */ /* RUDP/SM stack called BSM V1 (version 1 versus Version 0 used for SS7). */ #define SM_PROTOCOL_X100 0x0100 #define SM_PROTOCOL_X101 0x0101 diff --git a/epan/dissectors/packet-corosync-totemnet.c b/epan/dissectors/packet-corosync-totemnet.c index 85978ab49e..ba400dc0fb 100644 --- a/epan/dissectors/packet-corosync-totemnet.c +++ b/epan/dissectors/packet-corosync-totemnet.c @@ -137,7 +137,7 @@ On 12/14/2010 08:04 AM, Masatake YAMATO wrote: >>>> Honza >>> I got the similar comment from wireshark developer. >>> Please, read the discussion: ->>> https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3232 +>>> https://gitlab.com/wireshark/wireshark/-/issues/3232 >>> >> >> I've read that thread long time before I've sent previous mail, so @@ -214,7 +214,7 @@ nnn>> > >>> licensed in 3-clause BSD, as you know. I'd like to change the license >>> to merge my code to upstream project. I cannot do it in this context. ->>> See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3232#c13 +>>> See https://gitlab.com/wireshark/wireshark/-/issues/3232#c13 >>> Thank you. >> >> Regards, diff --git a/epan/dissectors/packet-dhcp.c b/epan/dissectors/packet-dhcp.c index b4f9007a55..5c45b68b76 100644 --- a/epan/dissectors/packet-dhcp.c +++ b/epan/dissectors/packet-dhcp.c @@ -2370,7 +2370,7 @@ dissect_dhcpopt_user_class_information(tvbuff_t *tvb, packet_info *pinfo, proto_ * "MSFT 5.0") such as "RRAS.Microsoft" and others like "iPXE". * In the unlikely case that the first character can be interpreted as a valid length the next iteration * of this while loop will catch that. - * https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16349 + * https://gitlab.com/wireshark/wireshark/-/issues/16349 * https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-dhcpe/fe8a2dd4-1e8c-4546-bacd-4ae10de02058 */ proto_item *expert_ti = proto_tree_add_item(tree, hf_dhcp_option77_user_class_text, tvb, offset, uci_len, ENC_ASCII|ENC_NA); diff --git a/epan/dissectors/packet-etch.c b/epan/dissectors/packet-etch.c index feaffec772..93f635c9e4 100644 --- a/epan/dissectors/packet-etch.c +++ b/epan/dissectors/packet-etch.c @@ -429,7 +429,7 @@ read_length(unsigned int *offset, tvbuff_t *tvb, proto_tree *etch_tree) if (*offset + length < *offset) { /* overflow case - * https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8464 */ + * https://gitlab.com/wireshark/wireshark/-/issues/8464 */ length = tvb_reported_length_remaining(tvb, *offset); } return length; diff --git a/epan/dissectors/packet-fcsp.c b/epan/dissectors/packet-fcsp.c index ce6bc6d20c..9cbee52fc5 100644 --- a/epan/dissectors/packet-fcsp.c +++ b/epan/dissectors/packet-fcsp.c @@ -191,7 +191,7 @@ static void dissect_fcsp_dhchap_auth_param(tvbuff_t *tvb, proto_tree *tree, default: /* If we don't recognize the auth_param_tag and the param_len * is 0 then just return to prevent an infinite loop. See - * https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8359 + * https://gitlab.com/wireshark/wireshark/-/issues/8359 */ if (param_len == 0) { return; diff --git a/epan/dissectors/packet-giop.c b/epan/dissectors/packet-giop.c index b2dd3df80d..c146090333 100644 --- a/epan/dissectors/packet-giop.c +++ b/epan/dissectors/packet-giop.c @@ -522,7 +522,7 @@ static const value_string target_address_discriminant_vals[] = { { 0, NULL} }; Bug fix: -https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2800 +https://gitlab.com/wireshark/wireshark/-/issues/2800 http://ethereal.netmirror.org/lists/ethereal-users/200303/msg00135.html */ static const value_string response_flags_vals[] = { diff --git a/epan/dissectors/packet-gsm_cbch.c b/epan/dissectors/packet-gsm_cbch.c index 5ac5bde142..b554a5de24 100644 --- a/epan/dissectors/packet-gsm_cbch.c +++ b/epan/dissectors/packet-gsm_cbch.c @@ -257,7 +257,7 @@ dissect_schedule_message(tvbuff_t *tvb, packet_info *pinfo, proto_tree *top_tree /* XXX I don't know if a message can validly contain more than * 48 slots, but that's the size of the array we create so cap * it there to avoid uninitialized memory errors (see bug - * https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9270) */ + * https://gitlab.com/wireshark/wireshark/-/issues/9270) */ if (sched_end > 48) sched_end = 48; while ((k and * Honorine_KEMGNE_NGUIFFO from - * https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4704 + * https://gitlab.com/wireshark/wireshark/-/issues/4704 * * Wireshark - Network traffic analyzer * By Gerald Combs diff --git a/epan/dissectors/packet-mpeg-pes.c b/epan/dissectors/packet-mpeg-pes.c index b1833a5b8a..2d5ce1cae0 100644 --- a/epan/dissectors/packet-mpeg-pes.c +++ b/epan/dissectors/packet-mpeg-pes.c @@ -903,7 +903,7 @@ dissect_mpeg_pes(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data offset = dissect_mpeg_pes_Stream(tvb, offset, &asn1_ctx, tree, hf_mpeg_pes_extension); - /* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2229 + /* https://gitlab.com/wireshark/wireshark/-/issues/2229 * A value of 0 indicates that the PES packet length * is neither specified nor bounded and is allowed * only in PES packets whose payload is a video diff --git a/epan/dissectors/packet-netflow.c b/epan/dissectors/packet-netflow.c index b9dda20dd5..16415e17b1 100644 --- a/epan/dissectors/packet-netflow.c +++ b/epan/dissectors/packet-netflow.c @@ -4887,7 +4887,7 @@ dissect_v9_v10_pdu_data(tvbuff_t *tvb, packet_info *pinfo, proto_tree *pdutree, /* have the same template with the same ID. */ /* XXX: One capture has been seen wherein the "length" field in the template is 0 even though the field is actually present in the dataflow. - See: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10432#c1 + See: https://gitlab.com/wireshark/wireshark/-/issues/10432#c1 */ continue; } diff --git a/epan/dissectors/packet-nwmtp.c b/epan/dissectors/packet-nwmtp.c index 30cda8ffb9..4ab1ade8c9 100644 --- a/epan/dissectors/packet-nwmtp.c +++ b/epan/dissectors/packet-nwmtp.c @@ -96,7 +96,7 @@ static int dissect_nwmtp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, vo call_dissector(mtp_handle, next_tvb, pinfo, tree); /* Check for overflows, which probably can't happen, but better * safe than sorry. See - * https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8169 + * https://gitlab.com/wireshark/wireshark/-/issues/8169 */ DISSECTOR_ASSERT(len < G_MAXUINT32 - 11); DISSECTOR_ASSERT((guint64)offset + len + 12 < G_MAXINT); diff --git a/epan/dissectors/packet-quic.c b/epan/dissectors/packet-quic.c index 800e1569cb..7d8c02add9 100644 --- a/epan/dissectors/packet-quic.c +++ b/epan/dissectors/packet-quic.c @@ -30,7 +30,7 @@ * Decryption is supported via TLS 1.3 secrets in the "TLS Key Log File", * configured either at the TLS Protocol preferences, or embedded in a pcapng * file. Sample captures and secrets can be found at: - * https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13881 + * https://gitlab.com/wireshark/wireshark/-/issues/13881 * * Limitations: * - STREAM offsets larger than 32-bit are unsupported. @@ -3257,7 +3257,7 @@ static tap_packet_status follow_quic_tap_listener(void *tapdata, packet_info *pinfo, epan_dissect_t *edt _U_, const void *data) { // TODO fix filtering for multiple streams, see - // https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16093 + // https://gitlab.com/wireshark/wireshark/-/issues/16093 follow_tvb_tap_listener(tapdata, pinfo, NULL, data); return TAP_PACKET_DONT_REDRAW; } diff --git a/epan/dissectors/packet-rtmpt.c b/epan/dissectors/packet-rtmpt.c index 3d723a0204..17e7f26d13 100644 --- a/epan/dissectors/packet-rtmpt.c +++ b/epan/dissectors/packet-rtmpt.c @@ -140,7 +140,7 @@ static gboolean rtmpt_desegment = TRUE; * exceed 256KB, but setting the limit there can cause massive memory * usage in some scenarios. For now make it a preference, but a better fix * is really needed. - * See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6898 + * See https://gitlab.com/wireshark/wireshark/-/issues/6898 */ static guint rtmpt_max_packet_size = 32768; diff --git a/epan/dissectors/packet-sip.c b/epan/dissectors/packet-sip.c index 398fffac4c..d375902c91 100644 --- a/epan/dissectors/packet-sip.c +++ b/epan/dissectors/packet-sip.c @@ -2112,7 +2112,7 @@ dissect_sip_contact_item(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, gi /* it is actually unusual - arguably invalid - for a SIP REGISTER * 200 OK _response_ to contain Contacts with expires=0. * - * See Bug https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10364 + * See Bug https://gitlab.com/wireshark/wireshark/-/issues/10364 * Why this warning was removed (3GPP usage, 3GPP TS24.229 ) */ #if 0 diff --git a/epan/dissectors/packet-tls-utils.c b/epan/dissectors/packet-tls-utils.c index 92a1e3d420..6b23620ee9 100644 --- a/epan/dissectors/packet-tls-utils.c +++ b/epan/dissectors/packet-tls-utils.c @@ -6507,7 +6507,7 @@ tls_dissect_certificate_authorities(ssl_common_dissect_t *hf, tvbuff_t *tvb, pac if (dnames_count-- == 0) { /* stop adding to tree when the list is considered too large - * https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16202 + * https://gitlab.com/wireshark/wireshark/-/issues/16202 Note: dnames_count must be set low enough not to hit the limit set by PINFO_LAYER_MAX_RECURSION_DEPTH in packet.c */ @@ -9397,7 +9397,7 @@ dissect_ssl3_hnd_cli_keyex_rsa(ssl_common_dissect_t *hf, tvbuff_t *tvb, case DTLSV1DOT0_OPENSSL_VERSION: /* OpenSSL pre-0.9.8f DTLS and pre-TLS quirk: 2-octet length vector is * not present. The handshake contents represents the EPMS, see: - * https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10222 */ + * https://gitlab.com/wireshark/wireshark/-/issues/10222 */ epms_len = length; break; diff --git a/epan/dissectors/packet-tpncp.c b/epan/dissectors/packet-tpncp.c index bd317bc3a1..42f42c6244 100644 --- a/epan/dissectors/packet-tpncp.c +++ b/epan/dissectors/packet-tpncp.c @@ -974,7 +974,7 @@ proto_register_tpncp(void) expert_tpncp = expert_register_protocol(proto_tpncp); expert_register_field_array(expert_tpncp, ei, array_length(ei)); - /* See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9569 for some discussion on this as well */ + /* See https://gitlab.com/wireshark/wireshark/-/issues/9569 for some discussion on this as well */ prefs_register_bool_preference(tpncp_module, "load_db", "Whether to load DB or not; if DB not loaded dissector is passive", "Whether to load the Database or not; not loading the DB" diff --git a/epan/dissectors/packet-usb-video.c b/epan/dissectors/packet-usb-video.c index 544e67ca39..f782d58483 100644 --- a/epan/dissectors/packet-usb-video.c +++ b/epan/dissectors/packet-usb-video.c @@ -858,7 +858,7 @@ dissect_usb_video_extension_unit(proto_tree *tree, tvbuff_t *tvb, int offset) { /* Too big to display as integer */ /* @todo Display as FT_BYTES with a big-endian disclaimer? - * See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7933 + * See https://gitlab.com/wireshark/wireshark/-/issues/7933 */ proto_tree_add_bytes_format(tree, hf_usb_vid_bmControl_bytes, tvb, offset, control_size, NULL, "bmControl"); } @@ -1752,7 +1752,7 @@ dissect_usb_vid_control_value(proto_tree *tree, tvbuff_t *tvb, int offset, guint else { /* @todo Display as FT_BYTES with a big-endian disclaimer? - * See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7933 + * See https://gitlab.com/wireshark/wireshark/-/issues/7933 */ proto_tree_add_bytes_format(tree, hf_usb_vid_control_value, tvb, offset, value_size, NULL, "%s", fallback_name); } diff --git a/epan/tvbuff_zlib.c b/epan/tvbuff_zlib.c index 9924bb1bfa..6d07bffccf 100644 --- a/epan/tvbuff_zlib.c +++ b/epan/tvbuff_zlib.c @@ -112,7 +112,7 @@ tvb_uncompress(tvbuff_t *tvb, const int offset, int comprlen) if (uncompr == NULL) { /* * This is ugly workaround for bug #6480 - * (https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6480) + * (https://gitlab.com/wireshark/wireshark/-/issues/6480) * * g_memdup(..., 0) returns NULL (g_malloc(0) also) * when uncompr is NULL logic below doesn't create tvb diff --git a/ipmap.html b/ipmap.html index d31140c839..fa8b542f4e 100644 --- a/ipmap.html +++ b/ipmap.html @@ -154,7 +154,7 @@ function loadGeoJSON(obj) { // MaxMind databases use km for accuracy, but they always use // 50, 100, 200 or 1000. That is too course, so ignore it and use a // fixed 1km radius. - // See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14693#c12 + // See https://gitlab.com/wireshark/wireshark/-/issues/14693#note_400735005 return L.circle(latlng, {radius: 1e3}); }, onEachFeature: function(feature, layer) { diff --git a/radius/README.radius_dictionary b/radius/README.radius_dictionary index 7a65101b08..d6401311af 100644 --- a/radius/README.radius_dictionary +++ b/radius/README.radius_dictionary @@ -1,6 +1,6 @@ [Dec-01-2010] Commented out global VSA:s from dictionary.ascend to avoid name clashes with IANA assigned VSA:s - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5455 + https://gitlab.com/wireshark/wireshark/-/issues/5455 [Jul-09-2009] diff --git a/radius/dictionary.iea b/radius/dictionary.iea index 5695634857..92a4da873c 100644 --- a/radius/dictionary.iea +++ b/radius/dictionary.iea @@ -11,7 +11,7 @@ BEGIN-VENDOR IEA-Software # AirMarshal Attributes [1-30] # Some added as per # -# https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6486 +# https://gitlab.com/wireshark/wireshark/-/issues/6486 # ATTRIBUTE AM-Interrupt-HTMLFile 1 string ATTRIBUTE AM-Interrupt-Interval 2 integer diff --git a/ui/qt/conversation_dialog.cpp b/ui/qt/conversation_dialog.cpp index 024ad53d76..eef606339e 100644 --- a/ui/qt/conversation_dialog.cpp +++ b/ui/qt/conversation_dialog.cpp @@ -28,13 +28,13 @@ #include // To do: -// - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6727 +// - https://gitlab.com/wireshark/wireshark/-/issues/6727 // - Wide last column? // + No arrows on unsorted columns // - Add follow stream to context menu // + Change "A <- B" to "B -> A" -// - Improper wildcard handling https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8010 -// - TShark consolidation https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6310 +// - Improper wildcard handling https://gitlab.com/wireshark/wireshark/-/issues/8010 +// - TShark consolidation https://gitlab.com/wireshark/wireshark/-/issues/6310 // - Display filter entry? // - Add follow, copy & graph actions to context menu. @@ -45,10 +45,10 @@ // - Closing the capture file clears conversation data. // Fixed bugs: -// - Friendly unit displays https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9231 -// - Misleading bps calculation https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8703 -// - Show Absolute time in conversation tables https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11618 -// - The value of 'Rel start' and 'Duration' in "Conversations" no need too precise https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12803 +// - Friendly unit displays https://gitlab.com/wireshark/wireshark/-/issues/9231 +// - Misleading bps calculation https://gitlab.com/wireshark/wireshark/-/issues/8703 +// - Show Absolute time in conversation tables https://gitlab.com/wireshark/wireshark/-/issues/11618 +// - The value of 'Rel start' and 'Duration' in "Conversations" no need too precise https://gitlab.com/wireshark/wireshark/-/issues/12803 static const QString table_name_ = QObject::tr("Conversation"); @@ -326,7 +326,7 @@ void init_conversation_table(struct register_ct* ct, const char *filter) // TrafficTableTreeWidgetItem / QTreeWidgetItem subclass that allows sorting // Minimum bandwidth calculation duration -// https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8703 +// https://gitlab.com/wireshark/wireshark/-/issues/8703 static const double min_bw_calc_duration_ = 5 / 1000.0; // seconds static const char *bps_na_ = UTF8_EM_DASH; diff --git a/ui/qt/geometry_state_dialog.h b/ui/qt/geometry_state_dialog.h index 0c93cda123..789dddc9e2 100644 --- a/ui/qt/geometry_state_dialog.h +++ b/ui/qt/geometry_state_dialog.h @@ -45,7 +45,7 @@ public: // W, L, X: Independent, minimize button. // // Additionally, maximized, parent-less dialogs can close to a black screen -// on macOS: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12544 +// on macOS: https://gitlab.com/wireshark/wireshark/-/issues/12544 // // Pass in the parent on macOS and NULL elsewhere so that we have an // independent window that un-maximizes correctly. diff --git a/ui/qt/wireshark_application.cpp b/ui/qt/wireshark_application.cpp index 9bf6ad931d..ade97751f5 100644 --- a/ui/qt/wireshark_application.cpp +++ b/ui/qt/wireshark_application.cpp @@ -828,8 +828,8 @@ void WiresharkApplication::emitAppSignal(AppSignal signal) // // On macOS emitting PacketDissectionChanged from a dialog can // render the application unusable: -// https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11361 -// https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11448 +// https://gitlab.com/wireshark/wireshark/-/issues/11361 +// https://gitlab.com/wireshark/wireshark/-/issues/11448 // Work around the problem by queueing up app signals and emitting them // after the dialog is closed. // diff --git a/ui/tap-rtp-analysis.c b/ui/tap-rtp-analysis.c index d86a0f0693..ee7158eb9e 100644 --- a/ui/tap-rtp-analysis.c +++ b/ui/tap-rtp-analysis.c @@ -221,7 +221,7 @@ rtppacket_analyse(tap_rtp_stat_t *statinfo, /* Reset flags */ statinfo->flags = 0; #if 0 - /*According to bug https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11478 + /*According to bug https://gitlab.com/wireshark/wireshark/-/issues/11478 * this code causes problems. A better solution is needed if there is need for the functionality */ /* Try to detect duplicated packets due to mirroring/span ports by comparing src MAC addresses. * Check for duplicates (src mac differs from first_packet_mac_addr) */ @@ -285,7 +285,7 @@ rtppacket_analyse(tap_rtp_stat_t *statinfo, * we assume that instead of being massively late we lost the packet(s) * that would have indicated the sequence number wrapping. An imprecise * heuristic at best, but it seems to work well enough. - * https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5958 */ + * https://gitlab.com/wireshark/wireshark/-/issues/5958 */ else if (statinfo->seq_num+1 < rtpinfo->info_seq_num || statinfo->seq_num - rtpinfo->info_seq_num > 0xFF00) { statinfo->seq_num = rtpinfo->info_seq_num; statinfo->sequence++; diff --git a/wiretap/erf.c b/wiretap/erf.c index b63fe3e1a6..97658bf44a 100644 --- a/wiretap/erf.c +++ b/wiretap/erf.c @@ -17,7 +17,8 @@ * https://www.endace.com/erf-extensible-record-format-types.pdf * * Version 8: - * https://bugs.wireshark.org/bugzilla/attachment.cgi?id=4333 (bug #4484) + * https://gitlab.com/wireshark/wireshark/uploads/f694bfee494784425b6545892180a8b2/Endace_ERF_Types.pdf + * (bug #4484) */ #include "config.h" diff --git a/wiretap/file_access.c b/wiretap/file_access.c index 23dd3b2b80..bf7467857f 100644 --- a/wiretap/file_access.c +++ b/wiretap/file_access.c @@ -325,7 +325,7 @@ wtap_get_all_capture_file_extensions_list(void) * * Note that the routine does not have to free the private data pointer on * error. The caller takes care of that by calling wtap_close on error. - * (See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8518) + * (See https://gitlab.com/wireshark/wireshark/-/issues/8518) * * However, the caller does have to free the private data pointer when * returning 0, since the next file type will be called and will likely diff --git a/wiretap/libpcap.c b/wiretap/libpcap.c index 4b80f86727..0b02691e44 100644 --- a/wiretap/libpcap.c +++ b/wiretap/libpcap.c @@ -676,7 +676,7 @@ static int libpcap_try_record(wtap *wth, FILE_T fh, int *err, gchar **err_info) * corrupt, and treating them as such makes the heuristics * much more reliable. See, for example, * - * https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9634 + * https://gitlab.com/wireshark/wireshark/-/issues/9634 * * (128MB is an arbitrary size at this point, chosen to be * large enough for the largest D-Bus packet). diff --git a/wiretap/wtap.h b/wiretap/wtap.h index ecba086802..4d57050920 100644 --- a/wiretap/wtap.h +++ b/wiretap/wtap.h @@ -419,7 +419,7 @@ extern "C" { * * For WTAP_ENCAP_USBPCAP, the maximum is 128MiB, as per * - * https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15985 + * https://gitlab.com/wireshark/wireshark/-/issues/15985 * * We don't want to write out files that specify a maximum packet size * greater than 262144 if we don't have to, as software reading those @@ -1653,7 +1653,7 @@ struct file_extension_info { * * Note that the routine does not have to free the private data pointer on * error. The caller takes care of that by calling wtap_close on error. - * (See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8518) + * (See https://gitlab.com/wireshark/wireshark/-/issues/8518) * * However, the caller does have to free the private data pointer when * returning WTAP_OPEN_NOT_MINE, since the next file type will be called